Progress in cryptology -- AFRICACRYPT 2017 : 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings /: 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings. (2017)
- Record Type:
- Book
- Title:
- Progress in cryptology -- AFRICACRYPT 2017 : 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings /: 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings. (2017)
- Main Title:
- Progress in cryptology -- AFRICACRYPT 2017 : 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings
- Other Titles:
- AFRICACRYPT 2017
- Further Information:
- Note: Marc Joye, Abderrahmane Nitaj (eds.).
- Editors:
- Joye, Marc, 1969-
Nitaj, Abderrahmane - Other Names:
- International Conference on Cryptology in Africa, 9th
- Contents:
- Intro; Preface; Organization AFRICACRYPT 2017; Contents; Cryptographic Schemes; RingRainbow -- An Efficient Multivariate Ring Signature Scheme; 1 Introduction; 2 Ring Signatures; 3 Multivariate Cryptography; 3.1 The Rainbow Signature Scheme; 3.2 Multivariate Ring Signature Schemes; 4 Our Ring Signature Scheme; 4.1 Security; 5 Parameters; 6 Alternative Construction of a Multivariate Ring Signature Scheme; 6.1 Unforgeability; 7 Reduction of Public Key Size; 8 Implementation and Efficiency Results; 9 Discussion; 10 Conclusion; References Pinocchio-Based Adaptive zk-SNARKs and Secure/Correct Adaptive Function Evaluation1 Introduction; 2 Preliminaries; 2.1 Algebraic Tools, Notation, and Complexity Assumptions; 2.2 Adaptive zk-SNARKs in the CRS Model; 2.3 The Pinocchio zk-SNARK Construction from; 3 Adaptive zk-SNARKs Based on Pinocchio; 4 Smaller Proofs and Comparison to Literature; 5 Secure/Correct Adaptive Function Evaluation; 5.1 Our Construction; 5.2 Efficient Instantiation Using Secret Sharing and Our zk-SNARK; 6 Prototype and Distributed Medical Research Case; 6.1 Prototype of Our zk-SNARK and Adaptive Trinocchio 6.2 Application to Medical Survival Analysis7 Conclusion; References; Revisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing Scheme; 1 Introduction; 2 Preliminaries; 2.1 Secret Sharing Schemes; 2.2 Symmetric Key Encryption; 2.3 Commitment Schemes; 2.4 Error Correcting Codes; 2.5 Information Dispersal Algorithms; 3 The AONT-RS;Intro; Preface; Organization AFRICACRYPT 2017; Contents; Cryptographic Schemes; RingRainbow -- An Efficient Multivariate Ring Signature Scheme; 1 Introduction; 2 Ring Signatures; 3 Multivariate Cryptography; 3.1 The Rainbow Signature Scheme; 3.2 Multivariate Ring Signature Schemes; 4 Our Ring Signature Scheme; 4.1 Security; 5 Parameters; 6 Alternative Construction of a Multivariate Ring Signature Scheme; 6.1 Unforgeability; 7 Reduction of Public Key Size; 8 Implementation and Efficiency Results; 9 Discussion; 10 Conclusion; References Pinocchio-Based Adaptive zk-SNARKs and Secure/Correct Adaptive Function Evaluation1 Introduction; 2 Preliminaries; 2.1 Algebraic Tools, Notation, and Complexity Assumptions; 2.2 Adaptive zk-SNARKs in the CRS Model; 2.3 The Pinocchio zk-SNARK Construction from; 3 Adaptive zk-SNARKs Based on Pinocchio; 4 Smaller Proofs and Comparison to Literature; 5 Secure/Correct Adaptive Function Evaluation; 5.1 Our Construction; 5.2 Efficient Instantiation Using Secret Sharing and Our zk-SNARK; 6 Prototype and Distributed Medical Research Case; 6.1 Prototype of Our zk-SNARK and Adaptive Trinocchio 6.2 Application to Medical Survival Analysis7 Conclusion; References; Revisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing Scheme; 1 Introduction; 2 Preliminaries; 2.1 Secret Sharing Schemes; 2.2 Symmetric Key Encryption; 2.3 Commitment Schemes; 2.4 Error Correcting Codes; 2.5 Information Dispersal Algorithms; 3 The AONT-RS; 3.1 Generalising the AONT-RS; 3.2 Information Leakage; 3.3 Proving the Privacy of AONT-RS; 4 Extending AONT-RS to be Robust; 4.1 Proof of Privacy; 4.2 Proof of Robustness; 5 Comparing RAONT-RS and HK2; 5.1 The SSMS and HK2 Scheme 5.2 Comparison6 Conclusion; References; Side-Channel Analysis; Climbing Down the Hierarchy: Hierarchical Classification for Machine Learning Side-Channel Attacks; 1 Introduction; 1.1 Idea and Contributions; 1.2 Road Map; 2 Machine Learning Techniques; 2.1 Naive Bayes; 2.2 Decision Tree -- C4.5; 2.3 Rotation Forest; 2.4 Support Vector Machines; 3 The Hierarchical Approach Under Test; 3.1 Experimental Data; 3.2 Training Phase and Parameter Tuning; 3.3 Testing Results; 4 Realistic Testing; 4.1 Hierarchical Attack; 4.2 Structured Attack; 4.3 Attack Results and Comparison with Template Attack 5 Discussion6 Conclusions; References; Multivariate Analysis Exploiting Static Power on Nanoscale CMOS Circuits for Cryptographic Applications; 1 Introduction; 2 Background; 3 Case Study; 3.1 4-Bit PRESENT Crypto-Core; 3.2 Full Implementation of PRESENT-80 Block Cipher; 3.3 Testbench; 4 Univariate Analysis of Information Leakage; 4.1 4-Bit PRESENT Crypto-Core; 4.2 Full Implementation of PRESENT-80 Block Cipher; 5 Multivariate Analysis: Can We Exploit More?; 6 Conclusion; References; Differential Bias Attack for Block Cipher Under Randomized Leakage with Key Enumeration; 1 Introduction … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2017
- Extent:
- 1 online resource (x, 231 pages), illustrations
- Subjects:
- 005.8/2
Computer science
Data encryption (Computer science) -- Congresses
Computer security -- Congresses
Computer security
Data encryption (Computer science)
Computer Science
Systems and Data Security
Data Encryption
Coding and Information Theory
Numeric Computing
Computation by Abstract Devices
Management of Computing and Information Systems
Computers -- Security -- General
Computers -- Information Theory
Computers -- Programming -- Algorithms
Computers -- Machine Theory
Business & Economics -- Information Management
Coding theory & cryptology
Mathematical theory of computation
User interface design & usability
Information architecture
Computer security
Data encryption (Computer science)
Coding theory
Electronic data processing
Information Systems
Computer security
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783319573397
3319573381
9783319573380 - Related ISBNs:
- 331957339X
9783319573380 - Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed May 19, 2017).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.357804
- Ingest File:
- 01_319.xml